Sciweavers

7378 search results - page 1300 / 1476
» Introduction to Machine Learning
Sort
View
97
Voted
ICDCSW
2008
IEEE
15 years 4 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
ICDM
2008
IEEE
160views Data Mining» more  ICDM 2008»
15 years 4 months ago
Direct Zero-Norm Optimization for Feature Selection
Zero-norm, defined as the number of non-zero elements in a vector, is an ideal quantity for feature selection. However, minimization of zero-norm is generally regarded as a combi...
Kaizhu Huang, Irwin King, Michael R. Lyu
ICEIS
2008
IEEE
15 years 4 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
83
Voted
ICIP
2008
IEEE
15 years 4 months ago
Gradual transition detection using color coherence and other criteria in a video shot meta-segmentation framework
Shot segmentation provides the basis for almost all high-level video content analysis approaches, validating it as one of the major prerequisites for efficient video semantic ana...
Efthymia Tsamoura, Vasileios Mezaris, Ioannis Komp...
ICMCS
2008
IEEE
148views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Audio tonality mode classification without tonic annotations
Traditional tonality mode (major or minor) classification or audio key finding algorithms often rely on tonic annotations (key names) of the training songs. However, unlike clas...
Zhiyao Duan, Lie Lu, Changshui Zhang
« Prev « First page 1300 / 1476 Last » Next »